The following glossary provides, for reference, brief definitions
for several terms as used in this paper in the context of protecting
information in computers.
Access
The ability to make use of information stored in a
computer system. Used frequently as a verb, to the
horror of grammarians.
Access control list
A list of principals that are authorized to have access to
some object.
Authenticate
To verify the identity of a person (or other agent
external to the protection system) making a request.
Authorize
To grant a principal access to certain information.
Capability
In a computer system, an unforgeable ticket, which
when presented can be taken as incontestable proof
that the presenter is authorized to have access to the
object named in the ticket.
Certify
To check the accuracy, correctness, and completeness
of a security or protection mechanism.
Complete isolation
A protection system that separates principals into
compartments between which no flow of information or
control is possible.